Lucene search

K
kasperskyKaspersky LabKLA11247
HistoryMay 08, 2018 - 12:00 a.m.

KLA11247 Multiple vulnerabilities in Microsoft Browsers

2018-05-0800:00:00
Kaspersky Lab
threats.kaspersky.com
60

7.6 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.3 High

AI Score

Confidence

High

0.955 High

EPSS

Percentile

99.4%

Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
  2. A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
  3. An information disclosure vulnerability in Microsoft Edge based on Edge HTML can be exploited remotely via specially crafted content to obtain sensitive information.
  4. A memory corruption vulnerability in Microsoft Browser can be exploited remotely via specially crafted website to execute arbitrary code.
  5. An information disclosure vulnerability in Microsoft Browser can be exploited remotely via specially crafted content to obtain sensitive information.
  6. A security feature bypass vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to bypass security restrictions.
  7. An information disclosure vulnerability in Scripting Engine can be exploited remotely to obtain sensitive information.
  8. A security feature bypass vulnerability in Internet Explorer can be exploited remotely via specially crafted application to bypass security restrictions.
  9. A memory corruption vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to execute arbitrary code.

Original advisories

CVE-2018-0943

CVE-2018-0945

CVE-2018-0946

CVE-2018-0951

CVE-2018-0953

CVE-2018-0954

CVE-2018-1021

CVE-2018-8123

CVE-2018-1022

CVE-2018-8130

CVE-2018-8178

CVE-2018-8128

CVE-2018-8133

CVE-2018-8114

CVE-2018-0955

CVE-2018-8139

CVE-2018-1025

CVE-2018-8112

CVE-2018-8145

CVE-2018-8126

CVE-2018-8137

CVE-2018-8122

CVE-2018-8179

CVE-2018-8177

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Microsoft-Internet-Explorer

Microsoft-Edge

ChakraCore

CVE list

CVE-2018-0943 critical

CVE-2018-0945 critical

CVE-2018-0946 critical

CVE-2018-0951 critical

CVE-2018-0953 critical

CVE-2018-0954 critical

CVE-2018-1021 warning

CVE-2018-8123 warning

CVE-2018-1022 critical

CVE-2018-8130 critical

CVE-2018-8178 critical

CVE-2018-8128 critical

CVE-2018-8133 critical

CVE-2018-8114 critical

CVE-2018-0955 critical

CVE-2018-8139 critical

CVE-2018-1025 warning

CVE-2018-8112 warning

CVE-2018-8145 critical

CVE-2018-8126 high

CVE-2018-8137 critical

CVE-2018-8122 critical

CVE-2018-8179 critical

CVE-2018-8177 critical

KB list

4103723

4103716

4103731

4103721

4103730

4103718

4103727

4103725

4103768

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

Affected Products

  • Internet Explorer 11Microsoft Edge (EdgeHTML-based)Internet Explorer 9Internet Explorer 10ChakraCore

References

7.6 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.3 High

AI Score

Confidence

High

0.955 High

EPSS

Percentile

99.4%